Cyber Security Conference: Emerging Str...
Last year, DoD networks suffered an onslaught of an estimated 360 million cyber attacks. As cyber attacks on US federal and commercial computer systems increase at alarming rates, the risk for national security to be compromised is also growing. Through cyber espionage and data theft, China acquired Joint Strike Fighter (JSF-35) aircraft plans. On eBay, a hard drive containing US missile defense data was for sale. Both the State of Virginia an...
Current and Future Military Data Links
Evaluation of OSD / Service Data Link Plans, Needs and Initiatives A Look at Future Data Links: MR-TCDL, N-CDL, TTNT, JTRS WNW, SRW A Detailed Technical Description of Links 4, 11, 16, MIDS/JTIDS, EPLRS and more… How they work Today and in the Future Understanding how the Latest JTRS Requirements Impact Data Link Development Guidelines for Integrating Data Links on Inhabited vs. Uninhabited Platforms Meeting Data Link Requirements for...
BusinessObjects Event: DC Area Business...
DC Area Business Objects Crystal Users Group Meeting This is your last chance to join the DC Area Business Objects Crystal Users Group for their next meeting on September 27, 2010. Come share information, get updates on the latest Business Objects technology, learn valuable tips and tricks, obtain feedback from fellow users, and establish contacts in the Business Objects community. This meeting has no fee but you must register to attend. Who s...
Unmanned Aircraft Systems East Conference
The recently released Quadrennial Defense Review (QDR) document has expectedly reemphasized the Department of Defense's (DoD) call for increased Unmanned Aircraft System (UAS) platform, payload and supporting technology development and procurement, paving the way for a multitude of opportunities and growth potential. The QDR also reinforced Congress? December 2009 approval for full funding on the DoD’s 2010 UAS budget request, totalling...
VertiGO Solutions featuring SteelCloud:...
DISA mandates that your BlackBerry Enterprise Servers be STIG compliant and that all of your agency smartphones utilize the appropriate wireless policy STIG. Conforming to this mandate requires implementing the Windows Server, .NET, SQL, and wireless STIGs; an expensive, time consuming and error prone process. Non-conformance with this critical mandate introduces security risks and the potential for penalties and sanctions. Utilizing a plug-an...
SAP BusinessObjects Text Analysis and D...
Please join SAP Government Support & Services to learn how SAP BusinessObjects Text Analysis (formerly Inxight Smart Discovery) and SAP BusinessObjects Data Services work together to extract, characterize, cleanse and assemble records of interest from unstructured information and free text.We will demonstrate how scores of text files (from public sources) are parsed and extracted, and the extracted items characterized, linked into records,...
Full-Motion Video Conference: The Promi...
Experts from OUSD, Army, USMC, DISA, NGA, General Dynamics, Textron, BAE Systems, SAIC, L-3 Communications, Northrop Grumman, Lockheed Martin, SAIC, Marshall Communications, HaiVision Network Video, Z Microsystems and many more examine: OSD/Services/IC Plans, Needs and Initiatives Status of Key Programs – Gorgon Stare, Valiant Angel, NOVA, etc. FMV and Wide-Area Persistent Surveillance Manned/Unmanned Aircraft Platforms; Space-based Capa...
Adobe RIA Webcast: Delivering Data to t...
Thank you for your interest! Delivering Data to the Edge Attendees of this webcast learned how rich application technologies running on DOD's Global Information Grid are reshaping the way commanders and individual warfighters make and communicate decisions, and saw real-world examples of how enhanced C4I capabilities are being delivered today on mature, time-tested software architectures, utilizing state-of-the-art visualization technologies.
Analyze the Who, What, When, and Now th...
Analyze the Who, What, When, and Now the “Where” with Analyst’s Notebook Esri® Edition i2 is a trusted provider of intelligence and investigation software world-wide. We have partnered with Esri® to release an unparalleled comprehensive solution for intelligence and crime analysis. Join our webcast to learn how integrating ArcGIS Server’s map views, server data, and basic GIS capabilities into i2's best-of-breed...
Shaping Knowledge from Open Source Vide...
Military and intelligence organizations capture and produce large amounts of textual, imagery, and video intelligence information every day. Increasingly, open source information such as news articles, videos, and blogs are also brought into the analytical process. Due to the vast amount of data produced and available for analysis, it is difficult to navigate this information and uncover activities and relationships that are of interest. To ad...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.